It's your volume group which hasn't enough free space. You either add another disk and add it to the VG, or reduce the swap LV for example.
swapoff -a
lvreduce -L4G pve/swap
mkswap /dev/pve/swap
# Check in /etc/fstab if the swap is referenced by UUID or by path, update UUID if needed
No, vzdump doesn't dump the RAM of the guest. It uses the qemu agent to freeze / unfreeze FS inside the guest to ensure consistency instead. When you say 4-5 sec of interruption, do you mean network outage of the VM ?
check_pve_sudo needs some parameters. The script can be run manually with eg
/var/lib/zabbix/bin/check_pve_sudo --cluster
/var/lib/zabbix/bin/check_pve_sudo --node=pve1
/var/lib/zabbix/bin/check_pve_sudo --guest=110
/var/lib/zabbix/bin/check_pve_sudo --storage=local-zfs
(you can add --pretty...
This is really more a Zabbix issue than a PVE one. On the PVE node, you have to check you have allowed your server (or proxy, depending on your setup) in /etc/zabbix/zabbix_agentd.conf with the Server directive. You also need to have the port 10050 reachable
OK. So, the zabbix user account running Zabbix agent on your PVE must be able to run the scripts with sudo, without password. You should be able to just drop conf/sudo.conf in /etc/sudoers.d/zabbix_agent.conf and it should work. (just adapt the path if you use something else than...
No step by step doc written, but here are the main steps :
Put disco_pve_sudo and check_pve_sudo on the PVE host you want to monitor. For example in /var/lib/zabbix/bin. Makes sure the scripts are executable. You might need to install some perl libs if they are not already installed...
You can hook this with some scripts and configuration. Here's what I'm doing, working with Zimbra as backend email server :
In Zimbra, there's always specials spam and ham users, where emails are fowarded when a user mark a mail as spam or as ham
In Zimbra, I create an IMAP account for PMG...
You can have a look at my scripts, made to monitor a whole cluster (just point zabbix at one node, which will monitor everything else) : https://git.fws.fr/fws/zabbix-agent-addons
in zabbix_scripts, you'll find disco_pve_sudo and check_pve_sudo which will do the hardwork (it's calling pvesh to...
You can take a look at the files here : https://git.fws.fr/fws/ansible-roles/src/branch/master/roles/sssd_ad_auth/templates (the various deb_xxx files). I'm using those to auth my PVE hosts against a Samba4 domain with sssd.
Cheers,
Daniel
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.